Questions tagged [public-key]

Public-key (or asymmetric) cryptography is a form of cryptography that does not require common secrets between the communicating partners.

Public-key cryptography or asymmetric cryptography is a form of cryptography that does not require common secrets between the communicating partners. It thus solves the problem of key-exchange. In many modern cryptosystems, public-key cryptography is used to establish a secret key, and the faster symmetric key crypto is used to actually encrypt and decrypt data.

Public-key cryptography is generally based on "one-way" mathematical functions - operations that are easy to perform, but difficult to undo. An example (on which RSA is based) is multiplication vs. factoring. Given two enormous primes p and q, it is simple (for a computer) to multiply them together to get p*q = n, but it turns out it is very difficult (even for a computer) to factor n in a reasonable amount of time.

1163 questions
-1
votes
1 answer

Ansible SSH passwd authentication successful, but publickey authentication fails

When using ansible, I authenticate using the following parameters: -u bob -k -K -b I get the output I want, but it turns out that Ansible fails publickey authentication on each system. Selected output from /var/log/secure on one of the recipient…
Mike
  • 179
  • 1
  • 1
  • 10
-1
votes
2 answers

Is there a free pgp key dumping program?

is there any pgp key dumping program like http://www.pgpdump.net/ that also shows the MPI values as well as the other information? the linked website's program will print out ... for the long MPI, which is perfectly logical, but I want to see the…
calccrypto
  • 8,583
  • 21
  • 68
  • 99
-1
votes
1 answer

different ssh login methods

Could you please help me to understand bellow authentication methods ssh -i PrivateKey.pem ec2-user@52.48.32.12 Password less athentication As per the my understanding in both above cases we use private key and public key. In both methods pubic…
UtpMahesh
  • 410
  • 10
  • 25
-1
votes
1 answer

How do I establish an HTTPS connection from client by the server public key to that specific server?

I have a client-server model. The server generated a key pair and shipped public keys to all the clients. In order to confirm the server is the real server I gonna to make connection to, I want to establish an HTTPS connection by the server public…
NINJAJA
  • 51
  • 1
  • 3
-1
votes
1 answer

OpenSSL d2i_RSA_PUBKEY resulting in Segmentation fault

My C program using RSA_genarate_key() function creates RSA public and private key. Then public key is saved in file after converted into DER format using i2d_RSA_PUBKEY(). File with public key seems to be ok openssl rsa -in public.der -inform DER…
michal
  • 115
  • 6
-1
votes
1 answer

Why is SSH trying to access a -cert's that do not exist?

Why is a simple ssh to a GoDaddy Server trying to use a "-cert" file. It does not exist? id_rsa and id_dsa exist. The -certs do not? Where is it getting the information to be including a -cert? OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 debug1:…
justdan0227
  • 1,374
  • 18
  • 48
-1
votes
2 answers

Performing an EC public key calculation for given secret key gives wrong results

I was trying to understand calculation of EC public key for given secret key. Following this question I was found a well explained answer, but (as often happens) something goes wrong. According to previous answer and this document I use following…
Kechup
  • 115
  • 2
  • 9
-1
votes
1 answer

Using Bitcoin-ruby to make a transaction

I originally posted this question on the bitcoin stack but was told I may have better luck reposting it here. I am having trouble with the bitcoin-ruby gem. I get the following error when trying to send money to another address I have on the test…
Ethan
  • 1
  • 1
-1
votes
1 answer

Finding out the public key of an ssh server

I have access to a student server and was interested in being able to visualize the public key of the ssh server. What unix command can help me see the ssh key, since this is different than my own generating of keys like on AWS etc.?
user3295674
  • 893
  • 5
  • 19
  • 42
-1
votes
1 answer

New host key while EC2 server is turned off

I have a server on EC2 that I was connecting to through FileZilla SFTP. Suddenly its asking me to trust a new host key. Even when the machine is turned off. Is this a man in the middle attack? How would it send a new host key if the machine is off?
user3238414
  • 125
  • 2
  • 12
-1
votes
1 answer

Which is the size of a digital certificate with the private/public keys?

I am involved in a project in which our employees need to sign specific documents using their digital signatures. To do this, each employee will have a RFID card to store their certificate with the private/public keys. My question is related to the…
-1
votes
1 answer

How to get the value between different classes in android

everyone. In my application, there were one public string variable (route_directory) and two button(downloadFolderButton,button_import_csv ). downloadFolderButton will be pressed first and get data from database. The data will be put into string…
Helloheyyyy
  • 63
  • 1
  • 1
  • 11
-1
votes
1 answer

Copying public key into remote node without password

I need to use a bash script to do the following: generate public private key on NodeA Copy the public key into a remote NodeB 's authorized_keys Add NodeB to NodeA's known_hosts. I need to do all this without a password prompt for ssh-ing into…
Aishwarya
  • 47
  • 6
-1
votes
1 answer

How to collect PKs used in bitcoins

From my humble understanding of bitcoins, it uses public key system. My question: How can I collect public keys or certificates that were used in bitcoins on the Internet? For example, I have previously collected public keys used in the 305.x…
user2192774
  • 3,807
  • 17
  • 47
  • 62
-1
votes
1 answer

How to use public key cryptography concept for securing system?

How to implement the concept of RSA to secure the system. Can anyone give simple examples in C#.net?
user2663526
  • 155
  • 1
  • 2
  • 8
1 2 3
77
78